Discussion Question 1 - Week 1 (Thursday):
Based on the Ledford article, what special issues must be considered for corporate data which is not fully digitized? What are the potential risks associated with the loss of this type of data?
Suchlike as vital as their electronic counterparts, are hardcopy files, records, and data. It can thus far be disputed that the softcopy of records and data is per se attributable to their lack of ability for retrieval in such instance of breakdown, stealing, or natural disaster. Pertaining to the Ledford (2010) publication, as follows are extraordinary concerns which preferably ought to be taking into account when information is not entirely digitized: restitution of records, preservation from natural disaster, protection of material, and recovery protocol. The generally …show more content…
essential of the four mentioned above is protection of the material since when the material as documents, information, papers, and others are well preserved and protected, it follows that the likelihood of potential devastation or thievery are lessened. Although this must not set aside the rest of the three issues even though the security is amplified, on the contrary it indicates that a bit of short respite is acceptable. The impending threat related with the loss of non-digitized or not entirely digitized records is that it can be unworkable to retrieve and salvage paper only assets and no recovery protocol (p.2 and 3). The lack of ability of records retrieval could be absolutely is scrutinized by examination of the delicate records confined in the Smithsonian and other national museums. Various records confined in those buildings are unduplicated; as a result the loss of the sole acknowledged record existing likely is injurious to the history of that particular culture or society. For instance for natural disasters, we could not preserved contrary to a few natural disasters, although we could put up with procedures to preserve the non-digitized data by way of means like an underground vaults. Regardless of the way applied to preserve these records is, assuming whichever of these documents is impaired or destructed, there is no concrete means to retrieve the documents.
Discussion Question 2 - Week 1 (Saturday):
Based on the Barr article, what special issues must be addressed for a risk management strategy that supports Web-based systems? Why the risks are associated with disruption of these web-based systems critical and require diligent consideration?
Web-based systems are persistently is crashed into by external forces largely because of their effortless openness from the Internet. With no suitable security procedures ready, like for instance anti-virus and anti-malware software, intrusion detection/prevention systems (IDPS), firewalls, and passwords, these systems are at widely potential for impairment of information. Different issues must be addressed accordingly to contend with these external destructive forces.
These procedures involve cyber security, ability planning, and recovery tolerances (Barr, 2010, p. 3). Cyber security cover a wide variety of subject matter, however the generally significant is that of determining the people who must have right of entry. Restricting the access to merely those individuals who actually require it will generally probable of lessening the danger of impending impairment to web-based systems. Different companies must not be concerned on an unexpected upsurge of users such as Facebook or EBay, accordingly their ability for storage can extend when the requirement occur. Although; in the exceptional deviations the requisite for a wider and further protected database is mandatory. Procedures and design must be ready ahead to deal with this problem if ever it occurs. Pertaining to recovery tolerance, all systems, and either it is for informational or monetary purposes must have a backup plan ready to curtail potential loss of
information The extensively fundamental purpose why it is decisive to determinedly persevere with systematic in security methods is because of the possibility it give rise to the loss of data and information notwithstanding either significant or insignificant a danger or threat is to a system. This loss of information and data is tantamount to a loss of money, trust, or both for a business. With regards to money, it implies the degree of downtime that the systems ought to cope with and pertaining to trust, it signifies the loss of client/customer of the business because of potential pilfering of data.
CMGT442: Summary for Week 1
Summary Discussion Question (Week 1):
For this first week's weekly summary topic, please find and summarize an IS risk management related current event. You may reference any source (Newspaper, Magazine, e-article, etc.) but please be sure to cite your source based on APA standards. Please keep your summary concise (1 paragraph) and include your perspective(s) and conclusion(s). If your source is web based, you may include a hyperlink to the reference website. You may post your article summary at any time during the week. Please provide peer feedback to at least one of your fellow class member's article summary.
The publication which I read was titled, "Hackers breach Heartland Payment credit card system" by Byron Acohido of USA Today, 2009. Although this report is not recent, it is yet noteworthy since it talks over the importance of not merely Internet security, but as well the manner to easily get access into their systems by means of a concealed malware program. As stated by the report, hackers plagiarize an indefinite magnitude of customer’s account data; although, it was expected to be in the millions. Heartland is the 6th prevalent credit card processing globally since they process credit transactions for restaurants, retailers, and merchants. Moreover, the commencement of hostilities was unspecified for further than a year and just before the company was advised and alerted by both MasterCard and VISA for irregular activity that Heartland discover the constant pilfering. In another report with reference to the same unpleasant incident, it was cited that the wrongdoer was a previous government computer expert who burglarized millions. The importance of this article to Information Systems Security is that regardless of the form of security measures and procedures are ready, there are constantly means that anyone is capable of to get access. Even the largely secured systems have their imperfection, thus it is very important that a security and recovery plan be prepared before whichever nature of occurrence happen. It did not affirm in the report if Heartland had a security and recovery plan, however since they are the 6th widely credit processing company, I will guess that they do have. What have been their measures ever since this occurrence is likely motivating to ascertain, that may possibly be the subject matter of my next Weekly Summary. Watch out!